The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
1999, volume: 16, number: 3

  1. Lynn Margaret Batten, Jeremy M. Dover
    Some Sets of Type in Cubic Order Planes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1999, v:16, n:3, pp:211-213 [Journal]
  2. Alexis Bonnecaze, Bernard Mourrain, Patrick Solé
    Jacobi Polynomials, Type II Codes, and Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1999, v:16, n:3, pp:215-234 [Journal]
  3. M. A. Chateauneuf, Charles J. Colbourn, Donald L. Kreher
    Covering Arrays of Strength Three. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1999, v:16, n:3, pp:235-242 [Journal]
  4. Sebastian Egner, Thomas Beth
    How to Play M13? [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1999, v:16, n:3, pp:243-247 [Journal]
  5. John Friedlander, Michael Larsen, Daniel Lieman, Igor Shparlinski
    On The Correlation of Binary Sequences. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1999, v:16, n:3, pp:249-256 [Journal]
  6. Philippe Gaborit, Masaaki Harada
    Construction of Extremal Type II Codes over Z. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1999, v:16, n:3, pp:257-269 [Journal]
  7. William J. Martin
    Designs in Product Association Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1999, v:16, n:3, pp:271-289 [Journal]
  8. Deirdre Longacher Smeltzer
    Properties of Codes from Difference Sets in 2-Groups. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1999, v:16, n:3, pp:291-306 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002